the proceedings contain 116 papers. the topics discussed include: advancements in ISAC: a review of multi-antenna technology integration for next-generation communication and sensing systems;research on data acquisiti...
ISBN:
(纸本)9798350379860
the proceedings contain 116 papers. the topics discussed include: advancements in ISAC: a review of multi-antenna technology integration for next-generation communication and sensing systems;research on data acquisition method of industrial edge devices and systems based on edge computing;a novel evaluation method of multi-channel information push efficiency in aviation flight;multi-scenario quantum key distribution mechanism for power grid terminals;VCFGAN: a two-stage collaborative filtering framework based on variational autoencoders and generative adversarial networks;optimizing multimodal sarcasm detection with a dual perceiving network and adaptive fusion;a realistic 3D-based information system for key populations with essential diseases;and an analysis of factors triggering abnormal cognitive states in cooperation between manned and unmanned aerial systems.
the proceedings contain 123 papers. the topics discussed include: automated machine learning based elderly fall detection classification;security concerns for 5G/6G mobile network technology and quantum communication;...
the proceedings contain 123 papers. the topics discussed include: automated machine learning based elderly fall detection classification;security concerns for 5G/6G mobile network technology and quantum communication;enhancement of the TSCH-Sim simulator to support manual scheduling and routing;multidimensional computer interconnection networks withthe virtual cut–through routing;cocoa companion: deep learning-based smartphone application for cocoa disease detection;a blockchain-based platform for data management and sharing;new and efficient lightweight cryptography algorithm for mobile and web applications;contextual information aware optimal communication in radio networks in considering the pervasive computing -a literature review;blockchain-based real-time information management in Remicon manufacturing process;shedding strategies for optimizing join processing in spatial data streams;live sentiment analysis using multiple machine learning and text processing algorithms;and designing a tool to address the depression of children during online education.
Honeypots are tools to help identify attackers' intrusion techniques, patterns and behaviors into IT systems. Among such systems, database management systems (DBMSs) are traditionally targeted software, as they st...
详细信息
Over the past decade, cloud computing has solidified its position as the primary platform for managing and processing extensive datasets within organizations. Despite its manifold advantages, integrating cloud computi...
详细信息
Withthe new advancements in cloud computing and internet of things (IoT), mobile applications are transforming the healthcare sector offering solutions for both users and researchers. the massive amounts of data gene...
详细信息
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601387
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of information Security Policies and Innovations in Digital technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios withthe Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
the purpose of this study is to analyse the use of informationtechnology in activities of health policy and relate it to the Municipal Management Effectiveness Index in Health and informationtechnology, among the 39...
详细信息
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601462
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of information Security Policies and Innovations in Digital technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios withthe Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601424
the proceedings contain 49 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of information Security Policies and Innovations in Digital technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios withthe Core Tax Administration System (CTAS);Enabling Grid Stability: Harnessing μPMU Data for Data-Driven Analysis of Grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
this study examines the impact of smart home security systems on property insurance claims. By analyzing insurance contract and claim case records from an insurance company, the research aims to identify correlations ...
详细信息
暂无评论